2021
DOI: 10.3390/app11114776
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Implementation of PRESENT and GIFT on Quantum Computers

Abstract: Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key cryptography can be lowered from n-bit to n2-bit. When applying Grover’s search algorithm to the block cipher that is the target of potential quantum attacks, the target block cipher must be implemented as quantum circuits. Starting with the AES block cipher, a numbe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(17 citation statements)
references
References 15 publications
0
17
0
Order By: Relevance
“…The quantum circuit given by LIGHTER-R requires the optimal number of qubits. Recently, the tool has been widely applied in the quantum circuit implementation of other cryptography, such as Present and Gift [39], RECTANGLE and KNOT [40], DEFAULT [41] and so on.…”
Section: A Decomposition Of S-boxmentioning
confidence: 99%
“…The quantum circuit given by LIGHTER-R requires the optimal number of qubits. Recently, the tool has been widely applied in the quantum circuit implementation of other cryptography, such as Present and Gift [39], RECTANGLE and KNOT [40], DEFAULT [41] and so on.…”
Section: A Decomposition Of S-boxmentioning
confidence: 99%
“…Employing other multiplication methods (e.g., quantum Karatsuba such as [14,30] or Toom Cook multiplication such as [31,32]) can be done accordingly by simply changing the underlying blocks since it is supported by Qiskit. Following previous works on quantum cryptanalysis [13,14,28], swap operations can be considered as free since it can be done via qubit relabeling [33,34].…”
Section: B Experiments Setup For Evaluationmentioning
confidence: 99%
“…Fortunately, there are implementations of both of them in the quantum world, that is, there are reversible implementations using quantum gates. The work in [24] provides a deeper analysis of the quantum circuit. Table 2 show the number of gates for PRESENT and GIFT.…”
Section: Algorithm 8 High Level Description Of Aesmentioning
confidence: 99%
“…Table 2 show the number of gates for PRESENT and GIFT. The authors in [24] give the estimation using CNOT and Toffoli gates, in order to use in our work we use the same decomposition as [17] and decompose 1 Toffoli gate as 7 T gates + 8 Clifford gates. We remark that this gives an upper bound on the number of T gates as we use the generic decomposition; the circuits above could be built using T-gates directly and possibly use fewer T gates [2].…”
Section: Algorithm 8 High Level Description Of Aesmentioning
confidence: 99%